Data Security using Compression and Cryptography Techniques (original) (raw)
Related papers
A Survey on Data Compression and Cryptographic Algorithms
2017
Data security and confidentiality issues are of paramount importance both within an organization in the form of a commercial (enterprise), a college, a government agency, as well as an individual (personal). Especially if the data is in a computer network connected/connected to the public network or the internet. The ability to access and provide information quickly and accurately will greatly affect an organization. In this paper, we will try to discuss the message/data delivery security system by using a form of encryption that aims to maintain the confidentiality of the data or the confidentiality of a message. So that messages/data that we send cannot be accessed or read by people who are not eligible. Because a lot of security systems are used by an organization or also personal, then here will use one of its methods that are by using a method of the security system using the Cryptographic algorithm.
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
IJIRIS Journal Division, 2017
E-commerce is one of most important fields in business process .many organization depend on e-commerce to enhance their work .there are many challenges faces the e commerce and has a negative effects in applying process such as security risks. Any organization depend on e-commerce must take data security in their consideration. Data security contains many areas, and the most important area is to secure the data from unauthorized access .Cryptography contain many techniques which can be used to apply the security for data. Cryptography may be used for many issues such as prevent unauthorized access, data integrity and authentication. Compression techniques contain some techniques which be used to reduce the bits which represent the data. In this survey we presents some of compression and cryptography techniques which be used to improve data security.
A Survey on Various Encoding, Encryption and compression Techniques
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2018
This paper reports about the survey of various techniques available in an encryption and also in compression technique. It is mainly analyzing the existing encoding and compressed cryptosystem together as a literature survey. It is also discussed about the security issues of using various encryption technique and compression technique to reduce the size of plain text as well as to increase the transmission speed of plain text from one end to other end. This survey analyses several encryption technique, compression technique and also various literature paper so that it provides an idea for efficient integrated methods using compressed crypto system for future work .
Compression and Encryption: An Integrated Approach
This paper considers different aspects related to two different but not opposite direction-Data Compression and Cryptography. In this paper a brief review of both of these branches-compression and encryption, need of data compression and data encryption has been discussed. Also, the need of integrating these two branches has been addressed. There occurs a problem of the order of applying these two processes i.e.; Compression should be applied first before Encryption or Encryption should be applied first before compression. This paper discusses this issue of order also of these two processes. Public key cryptography, also called asymmetric encryption, uses a pair of keys for encryption and
Data Security Using Private Key Encryption System Based On Compression
2016
Problem confronted by today's communicators is security as well as the pace of correspondence and size of the substance. In the present paper, a plan has been proposed which utilizes the idea of pressure and information encryption. On the first stage the center has been made on information pressure and cryptography. In the following stage we have underscored on pressure cryptosystem. At long last, proposed procedure has been examined which utilized the idea of information pressure and encryption. In this first information is compacted to diminish the measure of the information and expand the information transfer rate. Thereafter compress data is encrypted to give security. Consequently, our proposed system is powerful that can decrease information size, build information exchange rate and give the security amid correspondence. Keywords—Arithmetic coding; cryptography; skimming point number; one time cushion; compression crypto.
A Novel Approach for Secure Communication of Text Using Compression Mechanism
2015
The general encryption mechanism involves conversion of plain text into cipher text and decryption as vice versa, as well as multimedia(such as images, video, etc.,) the momentous aspect over here is that the converted cipher text always produces greater size than the original plain text. As there are innumerable number of internet users these days, more memory is accumulated in this process unnecessarily. To avoid such unnecessary accumulation of data we implement some data compression techniques over this encrypted data and also provide security mechanisms for the same and then send over the internet. But as we have many compression tools available in the open market, they fail to provide the security for the data at the same time. The same process can be implemented for the image encryption process. By encoding an image and compressing this encoded image along with security operations. Thus decryption provides the at most security for the data over the network. All the above disc...
Design and Develop an Approach for Integrating Compression and Encryption on Textual Data
The primary intention of this research is to design and develop an approach for integrating compression and encryption on textual data. This improved approach can provide the better security with the aid of encryption and also, can provide better compression with the help of encoding procedure. The advantage of combining the encoding procedure with the encryption technique is that the attacks relevant to storage can be easily avoided since the data is fully within encoded domain also; the storage space required will be less due to good compression ratio. With the advantages of this, we have planned to utilize the dictionary-based encoding procedure and proposed encryption method to comcryption protocol (Compression + encryption). For integrating the compression and encryption, dictionary-based compression and the encryption based on permutation, sorting and reordering will be used. Dictionarybased methods are capable of giving better compression rate as like huffman encoding also follows dictionary-based method. Also, permutation, sorting and reordering-based methods can provide better security if these operations are included in the encryption protocol.
A Review Paper on Data Encryption and Decryption
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2023
Cryptography is the technique for hiding data and information from unauthorized users. It is the art of achieving security by encoding messages to make them non-readable. When we send simple message from one location to another then this message called plain text is visible to anybody. If we want to codify the message called cipher text so that no one can easily understand the meaning of message then we use cryptography techniques. There are numerous applications where this technology is used such as ATM pin, Password, Credit Card number or any other secret communication. Cryptography can be divided into following three categories depending upon the types of key used: secret key (symmetric) cryptography, public key (asymmetric) cryptography and hash functions. In this paper we provide review of various types of cryptography techniques.